Fix JavaScript vulnerabilities in your project with Snyk (or try the free & open source CLI)
Test and protect my website
JavaScript Libraries with vulnerabilities
❌ The following list of JavaScript libraries were found to contain known and public security vulnerabilities.
We highly encourage you to upgrade to fixed versions as
soon as possible.
Monitor my web application's project dependencies
Security headers
HTTP security headers enable better browser security policies.
Successfully detected the following security headers:
Vulnerable library | Vulnerable version detected |
---|---|
|
2.1.4 |
|
2.1.4 |
|
2.1.4 |
New vulnerabilities are continuously found for jQuery, lodash, Angular and other libraries.
Monitor these libraries to protect your web application.
Stay up to date on CVEs by connecting your project to Snyk to receive automated notifications & fixes.
❌
The following security headers are missing from the website:
low severity
X Content Type Options
The only defined value, "nosniff", prevents Internet Explorer from MIME-sniffing a response away from the declared content-type. This also applies to Google Chrome, when downloading extensions
medium severity
X Frame Options
Clickjacking protection: deny - no rendering within a frame, sameorigin - no rendering if origin mismatch, allow-from - allow from specified location, allowall - non-standard, allow from any location
high severity
Content Security Policy
A computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection attacks resulting from execution of malicious content in the trusted web page context